..............page:347-349,352
..............page:409-410
..............page:394-396
..............page:389-390,393
..............page:418-419
..............page:406-408
..............page:382-385
..............page:374-376
..............page:372-373
Network Attack Type
zeng ling-zheng (data processing center; guangzhou statistics bureau; guangzhou 510030; china)
..............page:363-365
..............page:477-478,484
Research on Discovery of BBS Topic Based on LSA
wu hao1; geng huan-tong2 (1.department of computer science; anhui business college of vocational technology; wuhu 241002; china; 2.college of computer and software; nanjing university of information science & technology; nanjing 210044; china)
..............page:431-433
..............page:420-422
..............page:397-399
..............page:370-371,417
..............page:368-369,373
..............page:311-312,322
A New Solution of IP Network Qos
hou song-li1; li yuan2 (1.computer center of henan university; kaifeng 475001; china; 2.network information center of henan university; kaifeng 475001; china)
..............page:300-301,362
..............page:298-299,329
..............page:295-297
..............page:361-362
..............page:353-355
..............page:356-357
..............page:350-352
..............page:358-360
..............page:340-341,346
..............page:338-339,365
..............page:344-346
..............page:411-412
..............page:379-381
..............page:442-443,445
..............page:449-450,487
..............page:437-438
..............page:439-441
..............page:330-333
..............page:318-319
..............page:289-290
..............page:366-367
..............page:293-294
..............page:275-276,279
..............page:263-264
..............page:436,441
..............page:447-448
..............page:425-428
..............page:434-435
..............page:391-393
..............page:272-274
..............page:320-322
..............page:286-288
..............page:265-266
..............page:260-262,274
..............page:283-285
..............page:257-259
..............page:501-502
..............page:488-489,492
..............page:503,508
..............page:402-405,410
..............page:509-510
..............page:323-324,367
..............page:485-487
..............page:325-326,433
..............page:327-329
..............page:342-343
..............page:336-337
QoS's Router of Mobile Secure Network
lv ya-juan1; wang shuai2; li ying3 (1.jilin medical college computer office; jilin 132013; china; 2. military economical college team 3 of mster; wuhan 430035; china; 3. jilin medical college computer office; jilin 132013; china)
..............page:334-335
Design of Police-use Trojan Horse System
jiang ming-liang1; li zhi-qing2 (1.department of computer science and engineering; zhongkai university of agriculture and engineering; guangzhou 510225; china; 2. guangzhou party institute of ccp; guangzhou 510070; china)
..............page:309-310
..............page:499-500
..............page:313-315
..............page:307-308,310
..............page:280-282
..............page:302-303,355
..............page:493-494
..............page:277-279
SSL Protocol Analysis and Implementation
hu xiao-ye1; li jun-yi2 (1.baoji university of arts and sciences equipment department; baoji 721007; china; 2.dept. comput. sci. & tech.; shanxi police profes-sion college; xi an 710043; china)
..............page:304-306
..............page:316-317
..............page:291-292,294
..............page:506-508
..............page:267-268
..............page:269-271
..............page:511-512
..............page:495-496
..............page:504-505
CDMA Network Planning and Optimization
liang bo-yu1; chen xu-xiang2 (1.guangdong telecom corporation limited; zhuhai branch; zhuhai 519000; china; 2.mobile communications group guangdong co. ltd; zhuhai 519000; china)
..............page:481-484
..............page:456-457
..............page:464-465
..............page:466-467
..............page:416-417
..............page:423-424
..............page:429-430
..............page:468-469
The Digital TV and It's Criterion
dai jie1; hua wei-lie1; yao jing1; zhang jian1; li jun2; zheng jun-jie2 (1.xinhua press; nanjing 211105; china; 2.institute of meteorology; liberation army university of science and technology; nanjing 211101; china)
..............page:470-472
..............page:386,399
..............page:387-388
..............page:444-445
..............page:458-460
..............page:451-452
..............page:453-455
..............page:461-463
..............page:377-378,385
..............page:400-401,415
..............page:473-474
..............page:475-476
..............page:490-492
Research on the Linux Process Schedule
yu yun-xia1; 2 (1.college of computer; wuhan university; wuhan 448000; china; 2.department of computer; jingchu university of technology; jingmen 448000; china)
..............page:497-498
..............page:413-415
..............page:479-480